ruchikagargdiwakar / ml_cyber_security_usecasesLinks
This project contains files for cyber security
☆36Updated 6 years ago
Alternatives and similar repositories for ml_cyber_security_usecases
Users that are interested in ml_cyber_security_usecases are comparing it to the libraries listed below
Sorting:
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆73Updated 6 years ago
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆214Updated last year
- This is a paper list about Machine Learning for IDSes☆90Updated last year
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆96Updated 2 years ago
- A machine learning based Intrusion Detection System☆155Updated 5 years ago
- Cyber Attack Detection thanks to Machine Learning Algorithms☆105Updated 5 years ago
- ☆37Updated last year
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆39Updated last year
- Transfer Learning for Image-Based Malware Classification☆46Updated 3 years ago
- Detection of network traffic anomalies using unsupervised machine learning☆27Updated 3 years ago
- ☆25Updated 4 years ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆144Updated 2 years ago
- VGG-19 deep learning model trained using ISCX 2012 IDS Dataset☆143Updated 6 years ago
- NLP model and tech for cyber security tasks☆88Updated 2 years ago
- ☆84Updated 2 years ago
- Payload-Byte is a tool for extracting and labeling packet capture (Pcap) files of modern network intrusion detection datasets.☆44Updated last year
- Detection of malicious domain names using machine learning and deep learning models☆16Updated 7 years ago
- [IEEE S&P Workshop 2018] "Adversarial Deep Learning for Robust Detection of Binary Encoded Malware" Abdullah Al-Dujaili, Alex Huang, Erik…☆110Updated last year
- A logic-based enterprise network security analyzer☆134Updated 2 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆173Updated 2 years ago
- Machine-learning-based intrusion detection☆39Updated 7 years ago
- Extracting Attack Behavior from Threat Reports☆79Updated 2 years ago
- adversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants☆57Updated 2 years ago
- Towards Building an Intelligent Anti-Malware System: A Deep Learning Approach using Support Vector Machine for Malware Classification☆173Updated 2 years ago
- Adversarial Malware Generator Using GANs☆55Updated last year
- ☆34Updated 5 years ago
- A method for grouping, clustering, and merging semi-structured alerts☆24Updated last year
- Machine Learning Based Botnet Detection is a tool to classify network traffic as being botnet affected or not based on the network traffi…☆67Updated 5 years ago
- Coburg Intrusion Detection Data Sets☆51Updated 8 years ago
- In this work, we aim at developing a NIDS (Network Intrusion Detection System) that detects attacks targeting SCADA systems, in a concret…☆72Updated 2 years ago